Microsoft Research Blog

English

  1. Derivation of a Simple Synchronization Algorithm 

    February 5, 1987 | Leslie Lamport

    Chuck Thacker posed a little synchronization problem to me, which I solved with Jim Saxe's help. At that time, deriving concurrent algorithms was the fashion--the idea that you discover the algorithm by some form of black magic and then verify it was considered passĆ©. So,…

  2. Basic Polymorphic Typechecking 

    January 1, 1987 | Luca Cardelli

    Polymorphic means to have many forms. As related to programming languages, it refers to data or programs which have many types, or which operate on many types. There are several arbitrary ways in which programs can have many types; we are mostly interested in a…

  3. Authentication Revisited 

    January 1, 1987 | Mike Schroeder, David K. Gifford, and Roger M. Needham

    In a paper published in 1978 (Needham & Schroeder) we presented protocols for the use of encryption for authentication in large networks of computers. Subsequently the protocols were criticised (Denning and Sacco) on the grounds that compromise of a session key and copying of an…

  4. Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret 

    January 1, 1987 | Josh Benaloh

    In 1979, Blackley and Shamir independently proposed schemes by which a secret can be divided into many shares which can be distributed to mutually suspicious agents. This paper describes a homomorphism property attained by these and several other secret sharing schemes which allows multiple secrets…

  5. An Axiomatic Framework for Belief Updates 

    October 2, 1986 | David Heckerman

    In the 1940's, a physicist named Cox provided the first formal justification for the axioms of probability based on the subjective or Bayesian interpretation. He showed that if a measure of belief satisfies several fundamental properties, then the measure must be some monotonic transformation of…

  6. Towards a Better Understanding of the INTERNIST-1 Knowledge Base 

    October 1, 1986 | David Heckerman and Randolph A. Miller

    We consider two probabilistic interpretations for quantities found in the INTERNIST-1 knowledge base called evoking strengths. The first interpretation is based on the definition of evoking strengths while the second is based on the use of evoking strengths in the scoring scheme. We then describe…